{"version":"1.0","provider_name":"DMC, Inc.","provider_url":"https:\/\/www.dmcinfo.com","author_name":"Cody Cook","author_url":"https:\/\/www.dmcinfo.com\/blog\/author\/codyc\/","title":"Preparing for a Cybersecurity Assessment of Your Industrial Control System","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Ng0KB9AF0C\"><a href=\"https:\/\/www.dmcinfo.com\/blog\/19205\/preparing-for-a-cybersecurity-assessment-of-your-industrial-control-system\/\">Preparing for a Cybersecurity Assessment of Your Industrial Control System<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.dmcinfo.com\/blog\/19205\/preparing-for-a-cybersecurity-assessment-of-your-industrial-control-system\/embed\/#?secret=Ng0KB9AF0C\" width=\"600\" height=\"338\" title=\"&#8220;Preparing for a Cybersecurity Assessment of Your Industrial Control System&#8221; &#8212; DMC, Inc.\" data-secret=\"Ng0KB9AF0C\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/cdn.dmcinfo.com\/wp-content\/uploads\/2025\/05\/27162655\/Industrial-Cybersecuity-Assessment-Blog-Banner-Image-01.png","thumbnail_width":925,"thumbnail_height":400,"description":"With cybersecurity incidents of water systems and pipelines filling the headlines it is easy to understand why the cybersecurity of your industrial control system matters. Knowing exactly where to begin managing cybersecurity can be more difficult. Luckily, whether you have never considered the cybersecurity of your system or are strengthening your existing solutions, the first [&hellip;]"}